Across
- 2. Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
- 4. Type of software that secretly gathers information from a user's computer without their consent.
- 5. Simulated attack on a system to test its security defenses, often referred to as "pen testing."
- 6. Network security device that monitors and filters incoming and outgoing traffic based on predefined rules.
Down
- 1. Process of converting information into a secret code to prevent unauthorized access.
- 3. Software vulnerability unknown to the software maker, leaving it open for attack until patched.
- 5. Deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity, often through email.